Patents by Inventor Magnus Mortensen

Magnus Mortensen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190028347
    Abstract: Aspects of the disclosed technology address the problems of manually identifying and optimizing service chain (SC) performance bottlenecks by providing solutions for automatically identifying and tuning various SC parameters. In some aspects, a SC optimization process of the disclosed technology includes the replication or cloning of a SC for which traffic flow is to be optimized. Traffic flows for the production chain can then be simulated over one or more SC clones to identify and tune individual system parameters, for example, to determine if the simulated changes produce a positive, negative, or neutral change in flow performance. Systems and machine-readable media are also provided.
    Type: Application
    Filed: July 21, 2017
    Publication date: January 24, 2019
    Inventors: Jay Kemper Johnston, Michael Robertson, Magnus Mortensen, David C. White, JR.
  • Publication number: 20190026700
    Abstract: The present technology is a videoconference system for addressing room contention for a multi-endpoint meeting. The videoconference system includes a videoconference server that hosts a multi-endpoint meeting amongst local endpoints and remote endpoints, and a wallplate located outside of a physical room that includes a local endpoint. The wallplate receives input and transmits a room contention state indicator. The local endpoint receives the room contention state indicator and sends a room contention signal to the videoconference server, where the videoconference server transmits a room contention message to the remote endpoint.
    Type: Application
    Filed: July 20, 2017
    Publication date: January 24, 2019
    Inventors: Jay Kemper Johnston, Magnus Mortensen, David C. White, JR.
  • Publication number: 20190026460
    Abstract: An application security monitors data traffic from computing devices to a remote application in a first computing environment, such as a production service chain. The application security monitor detects an anomaly in the data traffic from a computing device. Based on the anomaly, the remote application is substantially reproduced in a second computing environment, such as a scrubbing environment. The application security monitor redirects the anomalous data to the remote application in the second computing environment. The application security monitor determines whether the data traffic from the first computing device corresponds to malicious activity or legitimate activity by the computing device. Responsive to a determination that the data traffic from the first computing device corresponds to legitimate activity, the application security monitor applies to the first computing environment any changes in the second computing environment caused by the redirected traffic from the computing device.
    Type: Application
    Filed: July 19, 2017
    Publication date: January 24, 2019
    Inventors: Michael J. Robertson, Magnus Mortensen, Jay K. Johnston, David C. White, JR.
  • Patent number: 10158605
    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: December 18, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: David C. White, Jr., Jay K. Johnston, Rama Darbha, Magnus Mortensen, Carlos M. Pignataro
  • Publication number: 20180359142
    Abstract: In one embodiment, a supervisory device in a network identifies a workaround for a symptom exhibited by a particular device in the network by traversing a path in a symptom-problem graph. The path in the graph includes a symptom vertex that represents the symptom, a problem vertex that shares an edge with the symptom vertex and represents a problem that causes the symptom, and a workaround vertex that shares an edge with the problem vertex and represents the workaround for the symptom. The supervisory device causes the identified workaround to be applied to the particular device and updates the path in the graph to replace the workaround vertex with a fix vertex that represents a fix for the problem that causes the symptom exhibited by the particular device. The supervisory device causes the fix to be applied to the particular device based on the updated path in the graph.
    Type: Application
    Filed: June 12, 2017
    Publication date: December 13, 2018
    Inventors: David C. White, JR., Jay Kemper Johnston, Magnus Mortensen
  • Patent number: 10127144
    Abstract: A testing server tests new code modules, or re-tests previously tested code modules, using individualized sets of test data. The testing server receives test datasets from an execution engine, which runs tested code modules to process operational datasets of computing devices. The testing server receives an untested code module from a user, and obtains test dataset parameters applicable to the untested code module. The testing server generates an individualized set of test datasets based on the test dataset parameters. The testing server tests the untested code module by processing each test dataset in the individualized set of test datasets to produce test results.
    Type: Grant
    Filed: October 24, 2016
    Date of Patent: November 13, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Jay K. Johnston, Magnus Mortensen, David C. White, Jr.
  • Publication number: 20180316545
    Abstract: In one embodiment, a device in a network maintains an information module to recommend system actions for a monitored system in the network. The information module generates recommendations using an information library database populated by one or more data sources. The device assesses behaviors of the information module and determines a review cadence for the information library database based on the assessed behaviors of the information module. The device updates the information library database according to the determined review cadence.
    Type: Application
    Filed: April 29, 2017
    Publication date: November 1, 2018
    Inventors: David C. White, JR., Magnus Mortensen, Jay Kemper Johnston
  • Patent number: 10089311
    Abstract: Search results returned by ad hoc queries integrate search results with usage analytics calculated from collected usage information for a system, such as a content management system. In response to receiving a query, the query is submitted to the system to obtain search results. Information from the usage analytics is integrated with the obtained search results. A search index of the system may include all/portion of the usage analytics such that the obtained results from the system may already be integrated with the usage analytics. The system is configurable such that users of the system may configure the usage events that are used to collect the usage information. The users may also configure parameters relating to the usage events and when/how the collected information is stored. The usage analytics may also be used to filter, collapse and boost different items in the search results.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: October 2, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Dag Steinnes Eidesen, Adrian Fanaru, Darrin Hatakeda, John D. Fan, Vegar Wang, Krister Mikalsen, Magnus Mortensen
  • Publication number: 20180248750
    Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller determines how network flows will be distributed in the networks due to the outage from installing the update, and generates an update plan that includes timing for installing the update on each network element. The timing is based on how the network flows will be distributed in the networks. The network controller installs the update in each network element according to the timing of the update plan.
    Type: Application
    Filed: February 27, 2017
    Publication date: August 30, 2018
    Inventors: Jay K. Johnston, David C. White, JR., Magnus Mortensen
  • Publication number: 20180239689
    Abstract: A system is provided to run new code modules safely in a duplicative, protected environment without affecting the code modules that are already trusted to be on the system. The system receives a new code module that validates operational data of a computing device, and instantiates a new, parallel execution engine to run the new code module on the operational data in parallel with another execution engine running the trusted/verified code modules that also validate the same operational data. The new engine runs the new code module with the operational data to produce new code module results. The production engine runs the trusted/verified code modules with the operational data to produce verified code module results. The new code module results are combined with the verified code module results to produce combined results describing the operational status of the computing device.
    Type: Application
    Filed: April 19, 2018
    Publication date: August 23, 2018
    Inventors: David C. White, JR., Magnus Mortensen, Jay K. Johnston
  • Publication number: 20180143868
    Abstract: Disclosed are systems, methods and non-transitory computer-readable mediums for dynamically presenting and updating a directed time graph displayed in a graphical user interface. In some examples, the method can include displaying a suggested path within a graphical user interface on a computer screen, the suggested path can include outstanding issues of elements of a network. The displaying the suggested path can include determining based on one or more factors an efficient ordering of the outstanding issues and ordering the outstanding issues based on the one or more factors. The method can also include monitoring, at regular intervals, updates to the one or more outstanding issues and automatically updating the suggested path, by a processor, based on the updates to the one or more outstanding issues.
    Type: Application
    Filed: November 22, 2016
    Publication date: May 24, 2018
    Inventors: Jay Kemper Johnston, Magnus Mortensen, David C. White, Jr., Joseph Michael Clarke
  • Patent number: 9977725
    Abstract: A system is provided to run new code modules safely in a duplicative, protected environment without affecting the code modules that are already trusted to be on the system. The system receives a new code module that validates operational data of a computing device, and instantiates a new, parallel execution engine to run the new code module on the operational data in parallel with another execution engine running the trusted/verified code modules that also validate the same operational data. The new engine runs the new code module with the operational data to produce new code module results. The production engine runs the trusted/verified code modules with the operational data to produce verified code module results. The new code module results are combined with the verified code module results to produce combined results describing the operational status of the computing device.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: May 22, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: David C. White, Jr., Magnus Mortensen, Jay K. Johnston
  • Publication number: 20180124553
    Abstract: In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes: broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
    Type: Application
    Filed: October 31, 2017
    Publication date: May 3, 2018
    Inventors: David C. WHITE,, JR., Magnus MORTENSEN, JAY Kemper JOHNSTON, Rama DARBHA
  • Publication number: 20180113798
    Abstract: A testing server tests new code modules, or re-tests previously tested code modules, using individualized sets of test data. The testing server receives test datasets from an execution engine, which runs tested code modules to process operational datasets of computing devices. The testing server receives an untested code module from a user, and obtains test dataset parameters applicable to the untested code module. The testing server generates an individualized set of test datasets based on the test dataset parameters. The testing server tests the untested code module by processing each test dataset in the individualized set of test datasets to produce test results.
    Type: Application
    Filed: October 24, 2016
    Publication date: April 26, 2018
    Inventors: Jay K. Johnston, Magnus Mortensen, David C. White, JR.
  • Publication number: 20180060208
    Abstract: A system is provided to run new code modules safely in a duplicative, protected environment without affecting the code modules that are already trusted to be on the system. The system receives a new code module that validates operational data of a computing device, and instantiates a new, parallel execution engine to run the new code module on the operational data in parallel with another execution engine running the trusted/verified code modules that also validate the same operational data. The new engine runs the new code module with the operational data to produce new code module results. The production engine runs the trusted/verified code modules with the operational data to produce verified code module results. The new code module results are combined with the verified code module results to produce combined results describing the operational status of the computing device.
    Type: Application
    Filed: August 26, 2016
    Publication date: March 1, 2018
    Inventors: David C. White, JR., Magnus Mortensen, Jay K. Johnston
  • Publication number: 20180007498
    Abstract: In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes: broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
    Type: Application
    Filed: June 29, 2016
    Publication date: January 4, 2018
    Inventors: David C. WHITE, JR., Magnus MORTENSEN, Jay Kemper JOHNSTON, Rama DARBHA
  • Patent number: 9860685
    Abstract: In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes: broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: January 2, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: David C. White, Jr., Magnus Mortensen, Jay Kemper Johnston, Rama Darbha
  • Publication number: 20170323235
    Abstract: Embodiments herein describe a fog drone that selects, organizes, monitors, and controls a plurality of drones in a fleet. The fog drone receives a job to be completed from a dispatcher and identifies the resources for accomplishing the job such as the amount of material (e.g., fiber optic cable) or the type of drones (e.g., drones with RF antennas or digging implements) needed to execute the job. Using the identified resources, the fog drone estimates the number of drones needed to complete the job and can recruit available drones to form the fleet. Once the fleet is formed, the fog drone determines a number of drones to place on standby to replace active drones if those drones need to recharge or malfunction.
    Type: Application
    Filed: May 5, 2016
    Publication date: November 9, 2017
    Inventors: Jay JOHNSTON, Rama DARBHA, David C. WHITE, JR., Magnus MORTENSEN
  • Publication number: 20170149784
    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
    Type: Application
    Filed: November 24, 2015
    Publication date: May 25, 2017
    Inventors: David C. White, Jr., Jay K. Johnston, Rama Darbha, Magnus Mortensen, Carlos M. Pignataro
  • Patent number: 9641915
    Abstract: In one embodiment, a method comprises receiving, by a broker device in a persistent data network, a request from one or more sensor consumers for sensor data originated by one or more isolated sensor devices, the isolated sensor devices not reachable by any wired or wireless infrastructure; sending, by the broker device via the persistent data network in response to the request, a message to a mobile collector device indicating an instruction for obtaining the sensor data from the one or more isolated sensor devices; and receiving, by the broker device in the persistent data network, the sensor data from the mobile collector device having established a local data connection with the one or more isolated sensor devices, and in response causing sending of a credit for receiving the sensor data to a registered user of the mobile collector device.
    Type: Grant
    Filed: May 7, 2015
    Date of Patent: May 2, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: David C. White, Jr., Jay Kemper Johnston, Magnus Mortensen